About Scott Cleland
![]() |
|
You are hereCybersecurityTwitter’s Realpolitik & The Sovereign-ization of the InternetSubmitted by Scott Cleland on Fri, 2012-01-27 19:12Reports that “Twitter Can Censor by Country” is a perfect example of how the world is changing the Internet. Change is a two-way street. Conventional wisdom that only assumes the Internet is changing the world risks being blind-sided by the Internet’s underappreciated exa-trend: how the world is changing the Internet. See my Forbes Tech Capitalist post: "Twitter Realpolitik & the Sovereignization of the Internet" to learn about Twitter's new realpolitik and how sovereign powers will increasingly be asserting themselves vis a vis the Internet. Seven Ways the World is Changing the InternetSubmitted by Scott Cleland on Wed, 2012-01-11 16:25Since most people focus on how the Internet is changing the world, few focus on the reverse -- how much the world is changing the Internet. See My Forbes Tech Capitalist blog post to learn the "Seven Ways the World is Changing the Internet."
SOPA Fixes Isolate Opponents, Especially GoogleSubmitted by Scott Cleland on Wed, 2011-12-14 12:20The House Manager’s Amendment to the pending House Stop Online Piracy Act (SOPA) fixed the major legitimate problems with the original bill, effectively isolating the small but extremely vociferous minority of SOPA opponents, especially Google. See my Forbes Tech Capitalist post here for a political outlook of the SOPA/PIPA anti-piracy legislation, which is likely to become law in 2012. In Defense of Rule of Law & "Cyber-Conservatism"Submitted by Scott Cleland on Mon, 2011-12-12 13:59Many thanks to Adam Thierer of the Technology Liberation Front, for selecting my book, Search & Destroy, as a top twenty most Important Cyber-Law & Info-Tech Policy books of 2011 because “it represented the beginning of an articulation of a philosophy of “cyber-conservatism.” I also thank Adam for his critical and insightful review of Search & Destroy, which clearly delineates his principled cyber-libertarian differences with my principled “cyber-conservative” views. Android’s Pickpocket behind Google WalletSubmitted by Scott Cleland on Fri, 2011-12-09 10:15The kerfuffle painting the Google Wallet App as an innocent victim of Verizon blocking -- in violation of an "open" Internet and net neutrality regulations -- completely misses the forest for the trees. This conflict revolves around two ongoing industry battles. To see what this kerfuffle is really all about read my Forbes Tech Capitalist blog post here: Android's Pickpocket behind Google Wallet.
Grand Theft Auto-mated! Online Ad-Economics Fuel Piracy & SOPA OppositionSubmitted by Scott Cleland on Wed, 2011-11-30 12:04
The likely passage of online anti-piracy legislation (SOPA/PIPA) in 2012 has put a spotlight on the substantial ad-based business interests aligned with piracy and against piracy enforcement. See my Forbes Tech Capitalist post here to learn why Grand Theft Auto-mated is such big business and so anti-piracy enforcement. Grand Theft Auto-mated! Online Ad-Economics Fuel Piracy & SOPA Opposition
The Top Ten Threats to GoogleSubmitted by Scott Cleland on Tue, 2011-11-15 12:19In compiling and ranking the top threats facing Google, I was amazed at the breadth, depth, diversity and seriousness of the threats and liabilities facing Google. Please see my Forbes Tech Capitalist post here to learn the ranking of what threats to Google are most serious and why. Google Too Fast and Loose for LAPDSubmitted by Scott Cleland on Fri, 2011-10-28 11:03How could Google fail to meet the security needs of the City of Los Angeles in its trophy government cloud contract? Learn why in my Forbes Tech Capitalist post here, entitled "Google Too Fast and Loose for LAPD." The Next Leg of Wireless Growth?Submitted by Scott Cleland on Tue, 2011-10-11 13:43See my Forbes Tech Capitalist post "The Next Leg of Wireless Growth? here. Google's Rogue WiSpy Invasive Behavior Proliferates -- Security is Google's Achilles Heel -- Part XIIISubmitted by Scott Cleland on Fri, 2011-06-17 11:59Evidence continues to mount that Google's management and supervision of its Android operating system is out-of-control when it comes to protecting privacy and security.
Consider the growing pattern of Google's default design and behavior that maximizes collection of private information, which inherently puts users at greater security risk.
First, and profoundly disturbing, is a new TechRepublic revelation in a post by security blogger Donovan Colbert.
In setting up his new Android-based tablet, Mr. Colbert discovered that the Android operating system by default, i.e. without permission, automatically collected and implemented encrytion key passcodes to automatically gain access to private networks without the permission of the user. In Mr. Colbert's own words: Pages |